![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.11481 |
Category: | Remote file access |
Title: | mod_auth_any command execution |
Summary: | NOSUMMARY |
Description: | Description: The remote host seems to be running mod_auth_any, an Apache Module which allows the use of third-party authentication programs. This module does not properly escape shell characters when a username is supplied, and therefore an attacker may use this module to : - Execute arbitrary commands on the remote host - Bypass the authentication process completely Solution : The freebsd team made patches, available at http://www.freebsd.org/cgi/cvsweb.cgi/ports/www/mod_auth_any/files/ Risk factor : High |
Cross-Ref: |
BugTraq ID: 7448 Common Vulnerability Exposure (CVE) ID: CVE-2003-0084 http://www.securityfocus.com/bid/7448 Computer Incident Advisory Center Bulletin: N-090 http://www.ciac.org/ciac/bulletins/n-090.shtml http://www.redhat.com/support/errata/RHSA-2003-113.html RedHat Security Advisories: RHSA-2003:114 http://rhn.redhat.com/errata/RHSA-2003-114.html XForce ISS Database: modauthany-command-execution(11893) https://exchange.xforce.ibmcloud.com/vulnerabilities/11893 |
Copyright | This script is Copyright (C) 2003 Renaud Deraison |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |